Home | Amazing | Today | Tags | Publishers | Years | Search 
Network Security Essentials (2nd Edition)
Network Security Essentials (2nd Edition)
This book provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. This books covers e-mail security, IP security, Web security, and network management security. It also includes a concise section on the discipline of cryptography—covering algorithms and protocols...
Wireless Communications Security (Artech House Universal Personal Communications)
Wireless Communications Security (Artech House Universal Personal Communications)
Addressing the fast-growing need to integrate effective security features into wireless communication systems, this cutting-edge book offers a broad overview of wireless security, so engineers can choose the methods and techniques that are most appropriate for their projects. Professionals gain a solid understanding of critical cryptography...
Firewalls: Jumpstart for Network and Systems Administrators
Firewalls: Jumpstart for Network and Systems Administrators
Security advice for any organization from a consultant with decades of experience

In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement
...
Pro PerformancePoint Server 2007: Building Business Intelligence Solutions (Expert's Voice in Business Intelligence)
Pro PerformancePoint Server 2007: Building Business Intelligence Solutions (Expert's Voice in Business Intelligence)
Pro PerformancePoint Server 2007 is Microsoft’s latest product in its line of business intelligence applications, a piece of software that gathers data from corporate databases and delivers it to an end user in a friendly, graphical fashion. PerformancePoint offers the next step in the digitization world. Businesses now have...
Building A Global Information Assurance Program
Building A Global Information Assurance Program
Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are...
Next Generation Networks: Perspectives and Potentials
Next Generation Networks: Perspectives and Potentials

Next Generation Networks (NGN) provide ubiquitous connectivity with pervasive accessibility to service, application, content and information.  NGN will bring tremendous advantages to companies and individuals, in terms of access to information, education and knowledge, efficiency, dematerialisation and new user experiences.

...

Pro Java EE Spring Patterns: Best Practices and Design Strategies Implementing Java EE Patterns with the Spring Framework
Pro Java EE Spring Patterns: Best Practices and Design Strategies Implementing Java EE Patterns with the Spring Framework
This book combines the Java EE design patterns with the Spring Framework. The Java EE design pattern catalog provides an invaluable reference for any Java EE application design and architecture. The Spring Framework, on the other hand, is the de facto standard for Java EE. Spring, with its inherently simple programming model and emphasis on object...
Pro SQL Server 2008 Service Broker
Pro SQL Server 2008 Service Broker
Service Broker is a key Microsoft product in support of message–based processing between applications. Pro SQL Server 2008 Service Broker helps you to take full advantage of this key Microsoft technology, beginning from the fundamentals, moving through installation and application development, and ultimately showing you how to...
Developing Software for Symbian OS 2nd Edition: A Beginner's Guide to Creating Symbian OS v9 Smartphone Applications in C++
Developing Software for Symbian OS 2nd Edition: A Beginner's Guide to Creating Symbian OS v9 Smartphone Applications in C++
Developing Software for Symbian OS 2nd Edition is an essential guide for anyone wishing to start de3veloping smartphone applications. The original book has been updated to cover Symbian OS v9 and changes to the developer environment, and now includes a new chapter on application signing and platform security.

Steve Babin's clear and...

PC Interfacing and Data Acquisition: Techniques for Measurement, Instrumentation and Control.
PC Interfacing and Data Acquisition: Techniques for Measurement, Instrumentation and Control.
Until fairly recently most scientific data-gathering systems and industrial control procedures were based on electromechanical devices such as chart recorders and analogue gauges. The capability to process and analyse data was rather limited (and in some cases error prone) unless one had access to a minicomputer or mainframe. Today, that situation...
CISSP: Certified Information Systems Security Professional Study Guide
CISSP: Certified Information Systems Security Professional Study Guide
Here's the book you need to prepare for the CISSP exam from (ISC)2. Written by a team of experienced security experts who know exactly what it takes to pass the test, this Study Guide provides:

Assessment testing to focus and direct your studies In-depth coverage of official test domains Hundreds of challenging practice questions, in the book...

.NET Wireless Programming
.NET Wireless Programming

Microsoft’s .NET strategy embraces a vision for integrating diverse elements of computing technology and data services. The wireless Internet and mobile devices are core components of that strategy. Visual Studio .NET includes a powerful set of toolsthe Mobile Internet Toolkitfor developing websites and applications...

Result Page: 203 202 201 200 199 198 197 196 195 194 193 192 191 190 189 188 187 186 185 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy